Syllabus No: CIS 200 Title: Fundamentals of Network Security Credits: 4 Coordinator: Dr. B. Dike-Anyiam, Computer Science & Networking Lecturer Instructor: Dr. B. Dike-Anyiam, Computer Science & Networking Lecturer Office Location: Tech 311 E Phone: 856-222-9311, ext. 2033 Email: Bdikeanyiam@bcc.edu Course Meetings: Mon & Wed 2-3.50pm Course Meeting Location: Tech 317 Prerequisite: CIS 165 or permission Course Description: This course introduces network security focusing on the overall processes with an emphasis on hands-on skills in the following areas: security policy design and management; security technologies, products and solutions; firewall and secure router design, installation, configuration, and maintenance; AAA implementation and VPN implementation using routers. Course Learning Outcomes Upon completion of the course, students will be able to: 1. Identify the basic principles of computer and network security. 2. Demonstrate knowledge of security policy design and management 3. Identify malicious codes, including viruses, worms, trojan horses, etc 4. Analyze attacks and implement defenses such as firewalls, intrusion detection and other countermeasures on computer/network systems 5. Demonstrate knowledge of societal issues in computer security, including legal, ethical, and governmental. Required Textbooks: 1. Title: Security+ Guide to Network Security Fundamentals Author: Ciampa Edition:4th Copyright Year:2012 ISBN: 9781111640125 2. Title: Applied Information Security: A Hands-On Guide to Information Security Software Author: Boyle Edition: 1st Copyright Year:2010 ISBN: 9780136122036 1
Program Educational Objectives The Electronics Engineering Technology Program and Computer Servicing & Networking Technology Option prepare graduates who, during the first few years after graduation, should be able to: 1. Find employment as a technician or transfer to a four-year college; 2. Apply a broad knowledge of electronics and computer engineering technology to support manufacturing, design, testing, troubleshooting, sales, and field service of electronic and computer systems; 3. Apply knowledge of analog and digital electronics, computers, networks, mathematics and science to solve technical problems or projects; 4. Utilize computers and software in a technical environment; 5. Perform written, oral and graphical communication; 6. Work effectively as a member of a team with a commitment to quality and timeliness; 7. Have a commitment to address professional, and ethical responsibilities, including societal and global issues and a respect for diversity; and 8. Continue professional development through conferences, seminars, courses and the pursuit of advanced degrees. 2
Student Outcomes Graduates of the Electronics Engineering Technology Program and Computer Servicing & Networking Technology Option should be able to: a. Apply the knowledge, techniques, skills, and modern tools of the discipline to engineering technology activities; b. Apply knowledge of analog and digital electronics, computers, networks, mathematics and science to technical problems or projects; c. Conduct standard laboratory tests and measurements, and to analyze and interpret experiments; d. Function effectively as a member of a technical team; e. Identify the characteristics of, analyze and solve technical problems; f. Apply written, oral, and graphical communication in both technical and non-technical environments; and an ability to use appropriate technical literature; g. Express the need for continuing professional development thru conferences, seminars, courses and the pursuit of advanced degrees; h. Express a commitment to address professional and ethical responsibilities, including societal and global issues and a respect for diversity; and i. Recognize a commitment to quality, timeliness and continuous improvement. j. The application of circuit analysis and design, computer programming, associated software, analog and digital electronics, and microcomputers, and engineering standards to the building, testing, operation, and maintenance of electrical/electronic(s) systems. k. The applications of physics or chemistry to electrical/electronic(s) circuits in a rigorous mathematical environment at or above the level of algebra and trigonometry. * Outcomes j. and k. are program specific outcomes from the document: CRITERIA FOR ACCREDITING ENGINEERING TECHNOLOGY PROGRAMS: Effective for Reviews During the 2014-2015 Accreditation Cycle and are not part of the general ABET Student Outcomes(a. -i.). 3
Course Outcome with Performance Criteria Course Learning Outcomes Students should be able to: 1. Identify the basic principles of computer and network security 2. Demonstrate knowledge of security policy design and management 3. Identify malicious codes, including viruses, worms, trojan horses, etc 4. Analyze attacks and implement defenses such as firewalls, intrusion detection and other countermeasures on computer/network systems 5. Demonstrate knowledge of societal issues in computer security, including legal, ethical, and governmental Performance Criteria: A minimum of 70% of students will achieve at least 7 out of the 10 points for each project. Also, a minimum of 70% of students will correctly answer at least 6 of 10 embedded multiple-choice test questions a) Test 1 (Embedded test questions) b) Project 1 a) Final Exam (Embedded test questions) b) Project 3 a) Test 1 (Embedded test questions) b) Project 1 a) Test 2 (Embedded test questions) b) Project 2 a) Final Exam (Embedded test questions) b) Project 3 Relationship of Course Learning Outcomes (#) to Student Outcomes (a, b, c ) Course Outcome # Student Outcomes - Graduates should be able to: 1, 2, 3, 4 a. Apply the knowledge, techniques, skills, and modern tools of the discipline to engineering technology activities 1, 2, 3, 4 b. Apply knowledge of analog and digital electronics, computers, networks, mathematics and science to technical problems or projects 1, 2, 3, 4 e. Identify the characteristics of, analyze and solve technical problems of the discipline to engineering technology activities 5 h. Express a commitment to address professional and ethical responsibilities, including societal and global issues and a respect for diversity 4
Topical Course Outline Malware and Social Engineering Attacks Application and Network Attacks Vulnerability Assessment and Mitigating Attacks Host, Application, and Data Security Network/Wireless Security Access Control Fundamentals Authentication and Account Management Basic Cryptography Business Continuity Risk Mitigation, security policy & procedures GRADING: A student s final grade in the course will be determined using the following percentage: 3 Projects 30% 2 Tests 30% Final Exam 35% Class Participation 5 % Total 100% A = 90-100% B+ = 85-89.99% B = 80-84.99% C+ = 75-79.99% C = 70-74.99% D = 60-69.99% F < 60% *** Final exam is comprehensive Attendance Students are expected to attend all classes and on time. Coming to class late and/or leaving class early without prior permission from the instructor will be counted as an absence. All materials will be collaborated as in class exercises and discussions. Attending all classes is the key to success in this class, since all exams will be based on those materials that are covered in the class. Two absences are permitted during the semester. If a student s absences are excessive, he/she may be assigned a grade of F. ** General Attendance Policy from Board Policy #206 Students are expected to attend all classes, clinical, laboratory, and studio sessions for the full duration of each instructional session. Students should set up a buddy system. Get phone # of at least one classmate to find out what is missed if absent, and to go over Home Work if any. ************** 5
Unacceptable/Disruptive behavior Disruptive behavior can include but is not limited to: Excessive talking in class when the instructor or another student is talking. There should be only one person talking at a time in class. The Instructor or a student...not both. Excessive trips out of the classroom for cell phone conversations, (If you are expecting an important call, let the instructor know ahead of time and sit by the door) Other Inappropriate activities include computer email, using social network (such as facebook, etc.; cell phone activities such as texting, playing games, listening to CD s, MP3s, or ipod s during Lecture or Lab. These items represent Prohibited Conducts as outlined in the BCC Student Code of Conduct. Under the sanctions, the student could be expelled from the class and receive an F grade. Tests/Exam Makeup tests/exams and assignments will be accepted at the instructor s discretion, and allowed only in extraordinary situations. I have a problem with my car is not an acceptable excuse. Class participation can be a combination of attendance, seeking help from the instructor or tutor, and classroom activities. Computer Usages Students are not allowed to use computers for any other purposes except for lecture notes during lectures and for practical. Student will be asked to leave the room if he or she persists in using a computer when not appropriate. Printing is not permitted during lectures. Student Expectations Students are expected to spend time beside classroom hours to read lessons and do homework. Students are encouraged to seek help early on either with the instructor or with a tutor. Do it now before it s too late. Any projects/class activities which are handed in less than two weeks late, will receive 70 % of the grade. No paper will be accepted after two weeks late. Academic Integrity Student must do his or her own work. Students caught sharing their projects with other students will be dealt with BCC Plagiarism Policy. Students can assist or receive assistance with each other but not copy the whole assignments. 6